KiZAN is a Microsoft National Solutions Provider specializing in technology solutions for customers across the United States. We can assess your goals, identify a solution that meets your needs, and help your business become more agile and efficient.

Security expert Mac McMillan was quoted by Healthcare IT News as saying:

“In most instances, the majority of security and law enforcement professionals would advise against paying the hackers, because, 1) there is no guarantee you will get the decryption key, and 2) there is the fear that it will encourage others to follow suit. I would argue that is easy advice to give if you are not the one looking down the barrel of the ransom note. Until you have walked in those shoes, you don't really know what you will do.”

Rather than take the risk, many organizations simply feel they and their patients will be safer by paying the ransom.

2) The perception is…healthcare is easy prey.

Cyber criminals, like any other brand of criminals, focus efforts on the easiest target with the highest perceived payoff. Many industries have hardened their defenses at a pace that far outstrips that of healthcare. In fact, one security firm ranked the healthcare industry in 9th place for its overall security compared to other industries.

“Where a financial-services firm might spend a third of its budget on information technology, hospitals spend only about 2 to 3 percent. “

3) Stolen healthcare records are the gift that keeps on giving.

Regardless of whether thieves collect any ransom, they can easily sell stolen patient records on the black market. In fact, most criminals would rather sell your data that attempt to use it. Why? Risk vs. Reward.

Stealing an identity and using it for financial gain not only takes time, but it also leaves a trail for investigators to follow. Quick cash can be made by simply selling stolen patient files.

“Hackers are likely interested in healthcare because of a perception that it is less tech savvy than finance or other industries, and because the personal data from electronic medical records is attractive for identity theft.”

Specifics of a ransomware attack

Typically, an attacker will research and target a specific organization or even a high-level individual within the organization (whale-phishing). However, the techniques used to gain access to the network are usually quite familiar and even low-tech, most often including sending emails (seemingly from a known or trusted sender) that encourage the targeted victim to reveal confidential information (spear-phishing).

Once network access is acquired, malware can “lock” access to the system or encrypt sensitive files. Large amounts of money are then demanded to unlock the files or restore access to the system. (Generally, the attacker has a list of file extensions or folder locations that the ransomware will target.)

Due to military grade encryption algorithms, it can be nearly impossible to decrypt the files without the original encryption key – which only the attackers will have.

Don’t click on any attachment or link in an email unless you have verified the source. Always be suspicious of any communication that seems “odd” or “out of place.” When in doubt, verify with your IT department before you do anything.

Don’t delay verifying questionable emails with IT. Others in your organization may have received the same email. IT can typically respond to any threats with enough advanced warning.

Interested in Healthcare Data Security?

Check out our blog

"Healthcare Security Demystified"

As KiZAN’s B2B Ambassador, my job is to cut through the buzzword clutter. With a background in broadcasting, writing, advertising, software development, and business ownership, I’m uniquely positioned to help you deflate the “marketing fluff” and identify solutions for the “true” needs of your organization.